Innovation November 13, 2017 October’s Most Wanted Malware: Cryptocurrency Mining Presents New Threat Check Point’s latest Global Threat Index has revealed crypto miners were an increasingly prevalent form ...
Research May 10, 2017 DiamondFox modular malware – a one-stop shop Check Point researchers have conducted a thorough investigation of the DiamondFox malware-as-a-service in collaboration with ...
Research March 22, 2017 Ransomware– Not Only File Encryption Ransomware is an ever-increasing threat worldwide, claiming new victims on a regular basis with no ...
Research March 14, 2017 Merry X-Mas Ransomware Decryption Tool Merry X-Mas is a ransomware that was first spotted in the wild on January 3, ...
Research February 21, 2017 2016 H2 Global and Regional Threat Intelligence Trends Introduction New, sophisticated threats continue to emerge on a daily basis across multiple platforms: social ...
Research September 9, 2016 (Ir)responsible Disclosure Computers have become an essential part of our lives, and in some cases, they are ...
Research May 25, 2016 Weaponized WordPress Tools WordPress is a free, open source content management system (CMS) for creating websites, and is considered ...
Research April 13, 2016 Check Point Threat Alert: Badlock Vulnerability EXECUTIVE SUMMARY An elevation-of-privilege vulnerability exists in Microsoft Windows and the Samba interoperability suite for ...
Research April 6, 2016 Congrats! More than 7000 applications in your database Security managers will appreciate Check Point’s Application Control Software Blade. With more than 7000 pre-defined ...
Security March 8, 2016 Top Malware Families Found in January 2016 Show DDoS on the Rise Distributed denial of service (DDoS) attacks are common threats that companies of all sizes have ...